990 likes | 1.63k Views
The Network Layer. Chapter 5. Network Layer Design Issues. Store-and-forward packet switching Services provided to transport layer Implementation of connectionless service Implementation of connection-oriented service Comparison of virtual-circuit and datagram networks.
E N D
The Network Layer Chapter 5
Network Layer Design Issues • Store-and-forward packet switching • Services provided to transport layer • Implementation of connectionless service • Implementation of connection-oriented service • Comparison of virtual-circuit and datagram networks
Store-and-Forward Packet Switching ISP’s equipment The environment of the network layer protocols.
Services Provided to the Transport Layer • Services independent of router technology. • Transport layer shielded from number, type, topology of routers. • Network addresses available to transport layer use uniform numbering plan • even across LANs and WANs
Implementation of Connectionless Service ISP’s equipment A’s table (initially) A’s table (later) C’s Table E’s Table Routing within a datagram network
Implementation of Connection-Oriented Service ISP’s equipment A’s table C’s Table E’s Table Routing within a virtual-circuit network
Comparison of Virtual-Circuit and Datagram Networks Comparison of datagram and virtual-circuit networks
Routing Algorithms (1) • Optimality principle • Shortest path algorithm • Flooding • Distance vector routing • Link state routing • Routing in ad hoc networks
Routing Algorithms (2) • Broadcast routing • Multicast routing • Anycast routing • Routing for mobile hosts • Routing in ad hoc networks
Fairness vs. Efficiency Network with a conflict between fairness and efficiency.
The Optimality Principle (a) A network. (b) A sink tree for router B.
Shortest Path Algorithm (1) The first five steps used in computing the shortest path from A to D. The arrows indicate the working node
Shortest Path Algorithm (2) . . . Dijkstra’s algorithm to compute the shortest path through a graph.
Shortest Path Algorithm (3) . . . . . . Dijkstra’s algorithm to compute the shortest path through a graph.
Shortest Path Algorithm (4) . . . Dijkstra’s algorithm to compute the shortest path through a graph.
Distance Vector Routing (a) A network. (b) Input from A, I, H, K, and the new routing table for J.
The Count-to-Infinity Problem The count-to-infinity problem
Link State Routing Discover neighbors, learn network addresses. Set distance/cost metric to each neighbor. Construct packet telling all learned. Send packet to, receive packets from other routers. Compute shortest path to every other router.
Learning about the Neighbors (1) Nine routers and a broadcast LAN.
Learning about the Neighbors (2) A graph model of previous slide.
Building Link State Packets (a) A network. (b) The link state packets for this network.
Distributing the Link State Packets The packet buffer for router B in previous slide
Hierarchical Routing Hierarchical routing.
Broadcast Routing Reverse path forwarding. (a) A network. (b) A sink tree. (c) The tree built by reverse path forwarding.
Multicast Routing (1) (a) A network. (b) A spanning tree for the leftmost router. (c) A multicast tree for group 1. (d) A multicast tree for group 2.
Multicast Routing (2) • Core-based tree for group 1. • Sending to group 1.
Anycast Routing • Anycast routes to group 1. • Topology seen by the routing protocol.
Routing for Mobile Hosts Packet routing for mobile hosts
Routing in Ad Hoc Networks The shaded nodes are new recipients. The dashed lines show possible reverse routes. The solid lines show the discovered route. • Range of A’s broadcast. • After B and D receive it. • After C, F, and G receive it. • After E, H, and I receive it.
Congestion Control Algorithms (1) • Approaches to congestion control • Traffic-aware routing • Admission control • Traffic throttling • Load shedding
Congestion Control Algorithms (2) When too much traffic is offered, congestion sets in and performance degrades sharply.
Approaches to Congestion Control Timescales of approaches to congestion control
Traffic-Aware Routing A network in which the East and West parts are connected by two links.
Traffic Throttling (1) (a) A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown.
Traffic Throttling (2) Explicit congestion notification
Load Shedding (1) A choke packet that affects only the source..
Load Shedding (2) A choke packet that affects each hop it passes through.
Quality of Service • Application requirements • Traffic shaping • Packet scheduling • Admission control • Integrated services • Differentiated services
Application Requirements (1) How stringent the quality-of-service requirements are.
Categories of QoS and Examples • Constant bit rate • Telephony • Real-time variable bit rate • Compressed videoconferencing • Non-real-time variable bit rate • Watching a movie on demand • Available bit rate • File transfer
Traffic Shaping (1) (a) Shaping packets. (b) A leaky bucket. (c) A token bucket
Traffic Shaping (2) (a) Traffic from a host. Output shaped by a token bucket of rate 200 Mbps and capacity (b) 9600 KB, (c) 0 KB.
Traffic Shaping (3) Token bucket level for shaping with rate 200 Mbps and capacity (d) 16000 KB, (e) 9600 KB, and (f) 0KB..
Packet Scheduling (1) Kinds of resources can potentially be reserved for different flows: • Bandwidth. • Buffer space. • CPU cycles.
Packet Scheduling (2) Round-robin Fair Queuing
Packet Scheduling (3) • Weighted Fair Queueing. • Finishing times for the packets.
Admission Control (1) An example flow specification
Admission Control (2) Bandwidth and delay guarantees with token buckets and WFQ.
Integrated Services (1) (a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.
Integrated Services (2) (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.